2010 | ||
---|---|---|
90 | Paul Z. Kolano, Carlo A. Furia, Richard A. Kemmerer, Dino Mandrioli: Refinement and Verification of Real-Time Systems CoRR abs/1002.1796: (2010) | |
2009 | ||
89 | Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna: Your botnet is my botnet: analysis of a botnet takeover. ACM Conference on Computer and Communications Security 2009: 635-647 | |
88 | Richard A. Kemmerer: How to Steal a Botnet and What Can Happen When You Do. ICICS 2009: 1 | |
87 | Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov: Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008. Computer Science - R&D 23(1): 15-25 (2009) | |
2008 | ||
86 | Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel: Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008 Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008 | |
85 | Davide Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, Richard A. Kemmerer, William K. Robertson, Fredrik Valeur, Giovanni Vigna: Are your votes really counted?: testing the security of real-world electronic voting systems. ISSTA 2008: 237-248 | |
84 | Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel: 08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense. Network Attack Detection and Defense 2008 | |
83 | Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov: 08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense. Network Attack Detection and Defense 2008 | |
82 | Richard A. Kemmerer, Roland Büschkes, Ali Fessi, Hartmut König, Peter Herrmann, Stephen D. Wolthusen, Marko Jahnke, Hervé Debar, Ralph Holz, Tanja Zseby, Dirk Haage: 08102 Outcome Working Group -- Situational Awareness. Network Attack Detection and Defense 2008 | |
2007 | ||
81 | Richard A. Kemmerer: So You Think You Can Dance? ACSAC 2007: 3-17 | |
80 | Darren Mutz, William K. Robertson, Giovanni Vigna, Richard A. Kemmerer: Exploiting Execution Context for the Detection of Anomalous System Calls. RAID 2007: 1-20 | |
79 | André Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer: Using a virtual security testbed for digital forensic reconstruction. Journal in Computer Virology 2(4): 275-289 (2007) | |
2006 | ||
78 | André Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer: Digital Forensic Reconstruction and the Virtual Security Testbed ViSe. DIMVA 2006: 144-163 | |
77 | Greg Banks, Marco Cova, Viktoria Felmetsger, Kevin C. Almeroth, Richard A. Kemmerer, Giovanni Vigna: SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr. ISC 2006: 343-358 | |
76 | William K. Robertson, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer: Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. NDSS 2006 | |
75 | André Årnes, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer: Using Hidden Markov Models to Evaluate the Risks of Intrusions. RAID 2006: 145-164 | |
2005 | ||
74 | Richard A. Kemmerer: Designing and implementing a family of intrusion detection systems. ASE 2005: 3 | |
2004 | ||
73 | Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan, Elizabeth M. Belding-Royer, Richard A. Kemmerer: An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks. ACSAC 2004: 16-27 | |
72 | Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer: A Comprehensive Approach to Intrusion Detection Alert Correlation. IEEE Trans. Dependable Sec. Comput. 1(3): 146-169 (2004) | |
71 | Zhe Dang, Tevfik Bultan, Oscar H. Ibarra, Richard A. Kemmerer: Past pushdown timed automata and safety verification. Theor. Comput. Sci. 313(1): 57-71 (2004) | |
2003 | ||
70 | Giovanni Vigna, William K. Robertson, Vishal Kher, Richard A. Kemmerer: A Stateful Intrusion Detection System for World-Wide Web Servers. ACSAC 2003: 34-45 | |
69 | Darren Mutz, Giovanni Vigna, Richard A. Kemmerer: An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. ACSAC 2003: 374-383 | |
68 | Giovanni Vigna, Fredrik Valeur, Richard A. Kemmerer: Designing and implementing a family of intrusion detection systems. ESEC / SIGSOFT FSE 2003: 88-97 | |
67 | Richard A. Kemmerer: Cybersecurity. ICSE 2003: 705-717 | |
66 | Richard A. Kemmerer, Giovanni Vigna: Internet Security and Intrusion Detection. ICSE 2003: 748-749 | |
65 | Zhe Dang, Pierluigi San Pietro, Richard A. Kemmerer: Presburger liveness verification of discrete timed automata. Theor. Comput. Sci. 1-3(299): 413-438 (2003) | |
64 | Zhe Dang, Oscar H. Ibarra, Richard A. Kemmerer: Generalized discrete timed automata: decidable approximations for safety verificatio. Theor. Comput. Sci. 296(1): 59-74 (2003) | |
2002 | ||
63 | Richard A. Kemmerer: A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later. ACSAC 2002: 109-118 | |
62 | Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richard A. Kemmerer: Composable Tools For Network Discovery and Security Analysis. ACSAC 2002: 14-24 | |
61 | Christopher Krügel, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer: Stateful Intrusion Detection for High-Speed Networks. IEEE Symposium on Security and Privacy 2002: 285- | |
60 | Steve T. Eckmann, Giovanni Vigna, Richard A. Kemmerer: STATL: An Attack Language for State-Based Intrusion Detection. Journal of Computer Security 10(1/2): 71-104 (2002) | |
59 | Oscar H. Ibarra, Jianwen Su, Zhe Dang, Tevfik Bultan, Richard A. Kemmerer: Counter Machines and Verification Problems. Theor. Comput. Sci. 289(1): 165-189 (2002) | |
2001 | ||
58 | Zhe Dang, Tevfik Bultan, Oscar H. Ibarra, Richard A. Kemmerer: Past Pushdown Timed Automata. CIAA 2001: 74-86 | |
57 | Zhe Dang, Oscar H. Ibarra, Richard A. Kemmerer: Decidable Approximations on Generalized and Parameterized Discrete Timed Automata. COCOON 2001: 529-539 | |
56 | Sebastian Fischmeister, Giovanni Vigna, Richard A. Kemmerer: Evaluating the Security of Three Java-Based Mobile Agent Systems. Mobile Agents 2001: 31-41 | |
55 | Giovanni Vigna, Richard A. Kemmerer, Per Blix: Designing a Web of Highly-Configurable Intrusion Detection Sensors. Recent Advances in Intrusion Detection 2001: 69-84 | |
54 | Zhe Dang, Pierluigi San Pietro, Richard A. Kemmerer: On Presburger Liveness of Discrete Timed Automata. STACS 2001: 132-143 | |
2000 | ||
53 | André L. M. dos Santos, Richard A. Kemmerer: Implementing Security Policies using the Safe Areas of Computation Approach. ACSAC 2000: 90-99 | |
52 | Zhe Dang, Oscar H. Ibarra, Tevfik Bultan, Richard A. Kemmerer, Jianwen Su: Binary Reachability Analysis of Discrete Pushdown Timed Automata. CAV 2000: 69-84 | |
51 | Paul Z. Kolano, Richard A. Kemmerer, Dino Mandrioli: Parallel Refinement Mechanisms for Real-Time Systems. FASE 2000: 35-50 | |
50 | Zhe Dang, Richard A. Kemmerer: Three approximation techniques for ASTRAL symbolic model checking of infinite state real-time systems. ICSE 2000: 345-354 | |
49 | Paul Z. Kolano, Richard A. Kemmerer: Classification schemes to aid in the analysis of real-time systems. ISSTA 2000: 86-95 | |
48 | Oscar H. Ibarra, Jianwen Su, Zhe Dang, Tevfik Bultan, Richard A. Kemmerer: Conter Machines: Decidable Properties and Applications to Verification Problems. MFCS 2000: 426-435 | |
47 | Richard A. Kemmerer: Editorial. IEEE Trans. Software Eng. 26(2): 97 (2000) | |
1999 | ||
46 | André L. M. dos Santos, Richard A. Kemmerer: Safe Areas of Computation for Secure Computing with Insecure Applications. ACSAC 1999: 35-44 | |
45 | Zhe Dang, Richard A. Kemmerer: Using the ASTRAL Model Checker to Analyze Mobile IP. ICSE 1999: 132-142 | |
44 | Zhe Dang, Richard A. Kemmerer: A Symbolic Model Checker for Testing ASTRAL Real-Time Specifications. RTCSA 1999: 174-181 | |
43 | Paul Z. Kolano, Zhe Dang, Richard A. Kemmerer: The Design and Analysis of Real-Time Systems Using the ASTRAL Software Development Environment. Ann. Software Eng. 7: 177-210 (1999) | |
42 | Richard A. Kemmerer: Editor's Note. IEEE Trans. Software Eng. 25(4): 433-434 (1999) | |
41 | Richard A. Kemmerer: Editorial. IEEE Trans. Software Eng. 25(6): 745-746 (1999) | |
40 | Giovanni Vigna, Richard A. Kemmerer: NetSTAT: A Network-based Intrusion Detection System. Journal of Computer Security 7(1): (1999) | |
1998 | ||
39 | Giovanni Vigna, Richard A. Kemmerer: NetSTAT: A Network-Based Intrusion Detection Approach. ACSAC 1998: 25- | |
38 | Richard G. Hamlet, Richard A. Kemmerer, Edward F. Miller, Debra J. Richardson: The Most Influential Papers from the ISSTA Research Community (Panel). ISSTA 1998: 49 | |
37 | Flavio De Paoli, André L. M. dos Santos, Richard A. Kemmerer: Web Browsers and Security. Mobile Agents and Security 1998: 235-256 | |
1997 | ||
36 | Richard A. Kemmerer: Security Issues in Distributed Software. ESEC / SIGSOFT FSE 1997: 52-59 | |
35 | Richard A. Kemmerer: Formally Specifying and Verifying Real-Time Systems. ICFEM 1997: 112- | |
34 | Alberto Coen-Porisini, Carlo Ghezzi, Richard A. Kemmerer: Specification of Realtime Systems Using ASTRAL. IEEE Trans. Software Eng. 23(9): 572-598 (1997) | |
1996 | ||
33 | Richard A. Kemmerer, Tad Taylor: A Modular Covert Channel Analysis Methodology for Trusted DG/UX/sup TM/. ACSAC 1996: 224-235 | |
32 | Richard Denney, Richard A. Kemmerer, Nancy G. Leveson, Alberto Savoia: Why State-of-the-Art is not State-of-the-Practice (Panel Abstract). ISSTA 1996: 293 | |
1995 | ||
31 | Alberto Coen-Porisini, Richard A. Kemmerer, Dino Mandrioli: A Formal Framework for ASTRAL Inter-level Proof Obligations. ESEC 1995: 90-108 | |
30 | Koral Ilgun, Richard A. Kemmerer, Phillip A. Porras: State Transition Analysis: A Rule-Based Intrusion Detection Approach. IEEE Trans. Software Eng. 21(3): 181-199 (1995) | |
1994 | ||
29 | Jeffrey Douglas, Richard A. Kemmerer: Aslantest: A Symbolic Execution Tool for Testing Aslan Formal Specifications. ISSTA 1994: 15-27 | |
28 | Alberto Coen-Porisini, Richard A. Kemmerer, Dino Mandrioli: A Formal Framework for ASTRAL Intralevel Proof Obligations. IEEE Trans. Software Eng. 20(8): 548-561 (1994) | |
27 | Richard A. Kemmerer, Catherine Meadows, Jonathan K. Millen: Three System for Cryptographic Protocol Analysis. J. Cryptology 7(2): 79-130 (1994) | |
1993 | ||
26 | Alberto Coen-Porisini, Richard A. Kemmerer: The Composability of ASTRAL Realtime Specifications. ISSTA 1993: 128-138 | |
1992 | ||
25 | Jonathan D. Reichbach, Richard A. Kemmerer: SoundWorks: An Object-Oriented Distributed System for Digital Sound. IEEE Computer 25(3): 25-37 (1992) | |
24 | Richard A. Kemmerer, Carlo Ghezzi: Guest Editors' Introduction: Specification and Analysis of Real-Time Systems. IEEE Trans. Software Eng. 18(9): 766-767 (1992) | |
1991 | ||
23 | Carlo Ghezzi, Richard A. Kemmerer: ASTRAL: An Assertion Language for Specifying Realtime Systems. ESEC 1991: 122-146 | |
22 | Phillip A. Porras, Richard A. Kemmerer: Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage Channels. IEEE Symposium on Security and Privacy 1991: 36-51 | |
21 | Richard A. Kemmerer, Phillip A. Porras: Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels. IEEE Trans. Software Eng. 17(11): 1166-1185 (1991) | |
1990 | ||
20 | Richard A. Kemmerer: A Multilevel Formal Specification of a Mental Health Care Database. DBSec 1990: 27-52 | |
19 | Richard A. Kemmerer: Integrating Formal Methods into the Development Process. IEEE Software 7(5): 37-50 (1990) | |
1989 | ||
18 | Richard A. Kemmerer: Formal Specification of a Mental Health Delivery System. DBSec 1989: 341-351 | |
17 | Richard A. Kemmerer: Completely Validated Software. ICSE 1989: 359-360 | |
1987 | ||
16 | Richard A. Kemmerer: Analyzing Encryption Protocols Using Formal Verification Authentication Schemes. CRYPTO 1987: 289-305 | |
15 | Richard A. Kemmerer: Formal Specification and Verification Techniques for Secure Database Systems. DBSec 1987: 229-240 | |
14 | Richard A. Kemmerer: Using Formal Verification Techniques to Analyze Encryption Protocols. IEEE Symposium on Security and Privacy 1987: 134-139 | |
13 | J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young: An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. IEEE Trans. Software Eng. 13(2): 157-168 (1987) | |
1986 | ||
12 | Richard A. Kemmerer: Analyzing Encryption Protocols Using Formal Verification Techniques. EUROCRYPT 1986: 48 | |
11 | J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young: An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. IEEE Symposium on Security and Privacy 1986: 14-24 | |
10 | Brent Auernheimer, Richard A. Kemmerer: RT-ASLAN: A Specification Language for Real-Time Systems. IEEE Trans. Software Eng. 12(9): 879-889 (1986) | |
1985 | ||
9 | Richard A. Kemmerer: Testing Formal Specifications to Detect Design Errors. IEEE Trans. Software Eng. 11(1): 32-43 (1985) | |
8 | J. David Blaine, Richard A. Kemmerer: Complexity measures for assembly language programs. Journal of Systems and Software 5(3): 229-245 (1985) | |
7 | Richard A. Kemmerer, Steven T. Eckman: UNISEX: A UNIX-based Symbolic EXecutor for Pascal. Softw., Pract. Exper. 15(5): 439-458 (1985) | |
1983 | ||
6 | Thomas H. Hinke, Jose Althouse, Richard A. Kemmerer: SDC Secure Release Terminal Project. IEEE Symposium on Security and Privacy 1983: 113-119 | |
5 | Richard A. Kemmerer: Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels ACM Trans. Comput. Syst. 1(3): 256-277 (1983) | |
1982 | ||
4 | Richard A. Kemmerer: A Practical Approach to Identifying Storage and Timing Channels. IEEE Symposium on Security and Privacy 1982: 66-73 | |
1980 | ||
3 | Bruce J. Walker, Richard A. Kemmerer, Gerald J. Popek: Specification and Verification of the UCLA Unix Security Kernel. Commun. ACM 23(2): 118-131 (1980) | |
2 | Daniel M. Berry, Richard A. Kemmerer, Arndt von Staa, Shaula Yemini: Toward Modular Verifiable Exception Handling. Comput. Lang. 5(2): 77-101 (1980) | |
1979 | ||
1 | Bruce J. Walker, Richard A. Kemmerer, Gerald J. Popek: Specification and Verification of the UCLA Unix Security Kernel (Extended Abstract). SOSP 1979: 64-65 |